Abstract
Until now, many works have focused on attempting to define cyber warfare, as well as appropriate response leading to conflict escalation. Instead, this paper proposes a comprehensive definition of Cyber Peacekeeping motivated by prior research on peacekeeping, cyber conflict and warfare, and international relations in cyberspace. Cyber Peacekeeping works to promote online safety and security, which assists in both physical and cyber conflict cessation, and helps protect cyber civilians from becoming either victims or participants in cyber conflicts. This work defines key terms of cyber peacekeeping, as well as its scope and goals in relation to conflict prevention, mitigation, aftermath containment and cleanup. We then propose a potential organizational structure of Cyber Peacekeeping to support its defined roles and functions. Through a case study of a notable past cyber conflict, examples of practical cyber peacekeeping are shown, as well as the roles that peacekeeping could have played in such conflicts.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bellamy, A.J., Williams, P.D., Griffin, S.: Understanding Peacekeeping. Polity, Cambridge (2010)
Lynn III, W.J.: Defending a new domain: the pentagon’s cyberstrategy. Foreign Aff. 89, 97–108 (2010)
Melzer, N.: Cyberwarfare and International Law. UNDIR Resources, Helgafell (2011)
Schmitt, M.N. (ed.): Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)
Hathaway, O.A.: The Law of Cyber-Attack. Faculty Scholarship Series. Paper 3852 (2012)
Allen, P.D., Demchak, C.: The Palestinian-Israeli Cyberwar. Mil. Rev. 83, 52 (2003)
Rehman, S.: Estonia’s Lessons in Cyberwarfare. USNews (2013)
Boo, H.-W., Lee, K.-K.: Cyber war and policy suggestions for South Korean planners. Int. J. Korean Unification Stud. 21(2), 85–106 (2012)
Cahill, T.P., Rozinov, K., Mule, C.: Cyber warfare peacekeeping, pp. 100. In: Proceedings of the 2003 IEEE Workshop on Information Assurance (2003)
Kleffner, J.K.: Keeping the cyber peace: international legal aspects of cyber activities in peace operations. Int. Law Stud. 89, 1 (2013)
Bayo, O.A.: The factors behind success and failures of United Nations peacekeeping missions: a case of the Democratic Republic of Congo. J. Altern. Perspect. Soc. Sci. 3(4), 19 (2012)
ITU International Multilateral Partnership Against Cyber Threats. http://www.impact-alliance.org/
NATO Cooperative Cyber Defense Center of Excellence. https://ccdcoe.org/
Bronk, C.: Hacks on Gas: Energy, Cybersecurity, and U.S. Defense. Rice University, Houston (2014)
Chang, Y.: Cyber conflict between Taiwan and China. Strateg. Insights 10(1), 25–35 (2011)
Farwell, J.P., Arakelian, D.: A Better Syria Option: Cyber War. The National Interest (2013)
Al-Marashi, I.: The Angel of Death is coming for you, ISIL. AlJazeera (2015)
Mobile Continues to Steal Share of US Adults’ Daily Time Spent with Media. eMarketer (2014)
Eugene Kaspersky Press Club 2013. Canberra, Australia (2013). http://outsidelens.scmagazine.com/video/Eugene-Kaspersky-Press-Club-201
Kulikova, A.: Is a cyber arms race between the US and Russia possible? Russia Direct (2015)
Cole, J.M.: China’s Shifting Cyber Focus on Taiwan. The Diplomat (2013)
Sartre, P.: Making UN Peacekeeping More Robust: Protecting the Mission, Persuading the Actors. International Peace Institute, New York (2011)
Das, S.K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier, Amsterdam (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering
About this paper
Cite this paper
Akatyev, N., James, J.I. (2015). Cyber Peacekeeping. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham. https://doi.org/10.1007/978-3-319-25512-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-25512-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25511-8
Online ISBN: 978-3-319-25512-5
eBook Packages: Computer ScienceComputer Science (R0)